Cyber Frontiers (Audio MP3)-logo

Cyber Frontiers (Audio MP3)

Technology Podcasts

Exploring Cybersecurity, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!

Exploring Cybersecurity, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!

Location:

Bellevue, NE

Description:

Exploring Cybersecurity, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!

Twitter:

@jcollison

Language:

English


Episodes

Identity Theft Protection in 2020 – CF062

4/22/2020
This week on Cyber Frontiers Jim and Christian explore how identity theft monitoring services continue to evolve in 2020 to include protection beyond traditional monitoring capabilities. We evaluate how effective these services have been historically, how the business model is shifting, and what the average consumer can expect in trying to increase overall security. We line up the discussion with historical anecdotes on social security, FTC litigations, and statistics on consumer theft at...

Duration:01:09:24

COVID-19 Data Analytics – CF061

3/25/2020
This week on Cyber Frontiers Christian and Jim tackle the technology shaping society amidst the Coronavirus (COVID-19). We dive into the health (and growth) of the internet backbone, working from home, and distance learning to name a few. We then switch gears into discussing how data and analytic capabilities behind the virus tricked into the mainstream and is now widely available to society at large to make well informed decisions. We specifically highlight the importance of accurate data...

Duration:01:08:17

Adversarial Machine Learning – CF060

2/14/2020
This week on Cyber Frontiers Christian and Jim dive into ‘jedi mind tricks’ of AI, better known as adversarial machine learning. We narrate stories that tell tales of fooling the common systems that humans have come to rely on today, from maps to self driving cars, to airport scanners and identification systems. We discuss the growing surface area for cyber physical attacks, and the lack of general purpose solutions and proofs needed to tackle securing machine learning algorithms. We tie...

Duration:01:03:54

Security Education with Cyber Skyline – CF059

12/16/2019
This week on Cyber Frontiers Christian and Jim interview Franz Payer, CEO of Cyber Skyline (cyberskyline.com) to discuss their platform for training and developing the next generation of security professionals in the industry. We discuss the current challenges in the security education market and explore where Cyber Skyline fills a critical gap across three products that help first-time participants and security practitioners alike up their infosec ability. We also take a look at the growing...

Duration:00:59:37

Quantum Supremacy and the Cryptology Time Machine – CF058

11/9/2019
This week on Cyber Frontiers Christian and Jim recap the latest major development in quantum research with Google’s “Quantum Supremacy” milestone. We review the headline narratives and compare today’s quantum progress with where we and others expected it to be. We delve into the tangentially related topic of cryptography, quickly leading to a walk through time of where secure computing has been and where it could be heading looking forward. Scattered throughout we bring in what it all means...

Duration:00:59:16

Cyber Anecdotes: A Tale of Worms, Shared Security, and More – CF057

8/22/2019
This week on Cyber Frontiers Christian and Jim recap security highlights from the past six weeks. We take a dive into the latest security challenges facing Windows 10, review the buzz around the Capital One breach, and jump into a variety of new tech from cell phone apps to detect pump skimmers to IBM’s unusual announcement of a blockchain-based web browser. We pack interesting anecdotes on the security landscape into an hour you won’t want to miss.  Cyber Frontiers is all about Exploring...

Duration:00:58:05

The Manifestation of New Exploitation – CF056

6/22/2019
This week on Cyber Frontiers we catch up on some of the latest exploitations and availability drops on the web. We kick off with a discussion of the release of the TCP SACK panic as a new mechanism for DDoS via TCP protocol. We then cover a spectrum of relevant security news with the Microsoft OS product line to round off our security deep dives. On the availability side, we recap the Target outage and the Google Cloud Outage and what it means for consumers. We round things off with some...

Duration:01:11:35

Data Breach SecOps, Reputations, and IoT Security – CF055

5/3/2019
This week on Cyber Frontiers Christian and Jim catch up on cyber anecdotes from our listeners! We start with a deep dive on the data breach website haveibeenpwned.com — and discuss ways users can leverage the data and APIs to reduce their surface area and take advantage of security best practice. From here we tangent onto corporate reputations and polling data, IoT device security, and more! We thread a needle of seemingly disjoint anecdotes into a show that has something for everyone. ...

Duration:01:03:25

Quantum, Cyber, Oh My! The Best of RSA 2019 – CF054

3/12/2019
This week on Cyber Frontiers Christian and Jim dive into recapping some of the best content from RSA 2019! We pack in a lot of content this show — ranging from a deep-dive into the most pervasive attack techniques in cybersecurity today to a comprehensive review on the state of quantum computing. Whether you are a math nerd, physicist, computer guy, or generalist — there is something for everyone in the quantum content we cover. We bring you what the modern frontier looks like on the sunset...

Duration:01:10:46

Containers Gone Wild – CF053

2/23/2019
This week Christian and Jim dive into the “doomsday” (dramatic much?) cyber event of 2019 — escaping Docker containers! Formally known as CVE-2019-5736, we dive deep on the technical research undertaken by Dragon Sector to take advantage of Linux namespaces in order to reveal the larger discovery and exploit and what it means for the industry. We cover it from the average guy angle as well, and include discussions on use cases for classic virtualization strategies compared to...

Duration:00:50:15

AI Rising – CF052

2/8/2019
This week on Cyber Frontiers we catch up on the lingo defining the technology frontier word cloud in 2019. Everyday we increasingly hear the phrase “we can do this now because of artificial intelligence (AI).” It’s showing up in product literature, super bowl ads, you name it! But is it really AI? How did we get to the new hype curve so quickly? We parse out the journey of the buzz from the year of cyber (2017), to the year of machine learning (2018), to what is rapidly shaping up as the...

Duration:01:08:58

Crypto and Blockchain: Enablers of the Future – CF051

11/17/2018
This week on Cyber Frontier Christian dives into the state of affairs in the cryptocurrency battle for adopters and the ultimate future of blockchain. We discuss some of the origins of what made Bitcoin popular and misunderstood, while re-tracing how it enabled blockchain technology to gain stronger visibility in the eyes of technologists. From here we discuss the fundamental advancements in computer science that enabled blockchain to succeed, and discuss its future in shaping the internet...

Duration:01:14:00

Computing Without the B.S. – CF050

10/16/2018
This week on Cyber Frontiers Christian and Jim discuss the computing industry without the bachelor’s degree (B.S.). We discuss the recently increasing trend of major tech companies doing away with degree requirements for top software engineering positions. We evaluate the pros and cons of university value propositions, co-ops/work studies, internships, and apprenticeships and discuss which jobs seem best tailored with-in the field for these backgrounds. As demand for these positions...

Duration:01:07:16

Kill The Ancient Authenticator! – CF049

9/26/2018
This week Christian is joined by Jim to talk about killing off password security on web and communication platforms, a.k.a. the era of the hardware authenticator! We dive deep into the release of the Yubikey 5, FIDO 2, and Webauthn standards and how these platforms and standards will usher in the next phase of improved cybersecurity for enterprises as well as the average guy. We talk about some of the historical implications of protocols that haven’t evolved over the last thirty years, and...

Duration:01:03:24

AI In Everyday Life: Is It Ready for the Limelight? – CF048

9/15/2018
This week on Cyber Frontiers Christian is joined by Jim to discuss common AI applications influencing everyday life. We take a look at the latest learning technology in discerning fake news, facial recognition at airports, and driverless cars in the Uber and Lyft fleets. We weigh in on what empirical methods are available for validating these use cases in AI, and the socioeconomic impacts that these technologies will create for the average guy in the next five to ten years.  Cyber Frontiers...

Duration:00:51:56

Highlights from DEFCON 26 – CF047

8/21/2018
This week on Cyber Frontiers Christian and Jim get together to talk about the highlights from DEFCON 26. We dive deep into how voicemails and SMS-unlocks are being used to bypass two-factor authentication on common technology platforms — and how simple attack surfaces are exploited to turn the old tech of voicemails into eye-candy for attackers. We also review the hardware and application based mechanisms used to avoid some of these commonly exploited vectors. We also take some time to...

Duration:00:55:28

The Modern Turing Test: A Brief History in ML and Some Cyber Anecdotes – CF046

7/10/2018
This Week on Cyber Frontiers Christian and Jim jump back into the world of machine learning and AI — a comprehensive conversation started on show 045 for those who missed it. We jump back in time to 1950 with the introduction of the Turing Test and walk us through its evolutions into modern AI and machine learning. We also discuss some of the recent cyber buzz with Gmail privacy concerns and new security features coming to iOS 12. Oh, and, fortnite players get excited about llamas too. ...

Duration:01:04:36

Difference between AI and ML, and How Does IoT Fit In Again? – CF045

6/26/2018
This week on Cyber Frontiers Christian and Jim explore the commercialization of artificial intelligence and machine learning. We explain the overlapping use of terms that the buzzword industry has created and separate fact from fiction. As ML and AI continue to drive businesses and the next frontier of technological innovation, we explore how the buzzwords of the past five years (I’m looking at you big data and IoT) have paved the framework for the buzzwords of 2018 and beyond. We lay the...

Duration:01:10:23

GDPR – What You Need to Know, RSA Conference Recap and Crypto Mining Update – CF044

6/15/2018
We’re back! This week on Cyber Frontiers Christian and Jim catch up on the avalanche of GDPR and separate fact from hype. We also take a dive into where we are with cryptocurrency security, weighing in on the recent Crypto Currency hack in South Korea and the overall maturity of the technology. We also relate the topics back to some of the big themes from RSA 2018 and provide a quick recap of the conference themes. Cyber Frontiers is all about Exploring Cyber security, Big Data, and the...

Duration:01:04:47

An Update on Meltdown and Spectre, ATM JackPotting and Christian Talks Crypto Currency – CF043

2/10/2018
This week on Cyber Frontiers we jump into and update on the public disclosures of the meltdown and spectre vulnerabilities. We also chat about the latest hardware hacking efforts with ATMs and JackPotting as well as get Christian’s take on Crypto Currency and the coin market. Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future! Christian Johnson will bring fresh and relevant topics to the show based on the current work he does. Support the...

Duration:01:04:44